Results 101 to 110 of about 437,233 (263)
A two‐step authentication framework for Mobile ad hoc networks [PDF]
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C. +2 more
core
A programmable interpenetrating double‐network architecture, created via 3D‐TIPS printing and resin infusion, synergistically combines thermoplastic and thermosetting elastomers to balance structural rigidity and surface softness—crucial for paediatric laryngeal stents.
Elizabeth F. Maughan +14 more
wiley +1 more source
Two‐photon lithography (TPL) enables 3D magnetic nanostructures with unmatched freedom in geometry and material choice. Advances in voxel control, deposition, and functionalization open pathways to artificial spin ices, racetracks, microrobots, and a number of additional technological applications.
Joseph Askey +5 more
wiley +1 more source
We present a prototype solution for improving transparency and quality assurance of the data linkage process through a data provenance dashboard designed to assist data analysts, researchers and information governance teams in authenticating and ...
Katherine O'Sullivan +8 more
doaj +1 more source
A FeN4─O/Clu@NC‐0.1Ac catalyst containing atomically‐dispersed FeN4─O sites (medium‐spin Fe2+) and Fe clusters delivered a half‐wave potential of 0.89 V for ORR and an overpotential of 330 mV at 10 mA cm−2 for OER in 0.1 m KOH. When the catalyst was used in a rechargeable Zn–air battery, a power density of 284.5 mW cm−2 was achieved with excellent ...
Yongfang Zhou +8 more
wiley +1 more source
Access control management for e-Healthcare in cloud environment
Data outsourcing is a major component for cloud computing that allows data owners to distribute resources to external services for users and organizations who can apply the resources.
Lili Sun, Jianming Yong, Jeffrey Soar
doaj +1 more source
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee +17 more
wiley +1 more source
Towards a UK federation of trusted research environments
ObjectivesPhase 1 of the DARE UK programme concluded in 2024 with a portfolio of architectures, designs and proofs-of-concept for a national federated network of trusted research environments (TREs). We present the current state of the UK’s journey towards a TRE federation. MethodsOur approach was four-fold.
Rob Baxter, null DARE UK Delivery Team
openaire +1 more source
Synthetic Nanobiology Actuated Lipometabolic Cell Factory for Autologous Tumor Immunotherapy
FA plays a crucial role in the interaction between tumor cells and the tumor microenvironment, especially for the immune response. A biocatalytic immunoenhancement strategy is developed to boost antitumor immunity by FA metabolic orientation to ceramide. Through the design of this delicate catalytic immunoenhancement strategy, the synthetic nanobiology
Shoujie Zhao +8 more
wiley +1 more source
A diagnostic process is an investigative process that takes a clinical picture as input and outputs a diagnosis. We propose a method for distinguishing diagnoses that are warranted from those that are not, based on the cognitive processes of which they ...
Ceusters, Werner +3 more
core

